WO2018107729A1 - Procédé et appareil d'affichage d'image utilisant un masquage de confidentialité - Google Patents

Procédé et appareil d'affichage d'image utilisant un masquage de confidentialité Download PDF

Info

Publication number
WO2018107729A1
WO2018107729A1 PCT/CN2017/091843 CN2017091843W WO2018107729A1 WO 2018107729 A1 WO2018107729 A1 WO 2018107729A1 CN 2017091843 W CN2017091843 W CN 2017091843W WO 2018107729 A1 WO2018107729 A1 WO 2018107729A1
Authority
WO
WIPO (PCT)
Prior art keywords
privacy
original image
masking
image
information
Prior art date
Application number
PCT/CN2017/091843
Other languages
English (en)
Chinese (zh)
Inventor
俞海
浦世亮
Original Assignee
杭州海康威视数字技术股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州海康威视数字技术股份有限公司 filed Critical 杭州海康威视数字技术股份有限公司
Priority to US16/469,909 priority Critical patent/US11163897B2/en
Priority to EP17880938.0A priority patent/EP3557864A4/fr
Publication of WO2018107729A1 publication Critical patent/WO2018107729A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/454Content or additional data filtering, e.g. blocking advertisements
    • H04N21/4545Input to filtering algorithms, e.g. filtering a region of the image
    • H04N21/45455Input to filtering algorithms, e.g. filtering a region of the image applied to a region of the image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/50Constructional details
    • H04N23/51Housings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/44Receiver circuitry for the reception of television signals according to analogue transmission standards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/64Constructional details of receivers, e.g. cabinets or dust covers

Definitions

  • the embodiments of the present invention relate to the field of video surveillance, and in particular, to a method and an apparatus for displaying an image based on privacy masking.
  • Privacy masking refers to a method of occluding or blurring a local position in a surveillance image in order to protect personal privacy. It is mainly applied to an image collection end, such as a surveillance camera installed in a public place or a private place. After the image collection end masks the captured image, the masked image can be sent to the playing end, and the blocked image is displayed by the playing end.
  • the image collecting end needs to provide an original image and a shadow image.
  • the image collecting end may collect an image of the monitoring scene, obtain an original image, and then acquire a privacy area manually configured by the user for the original image or automatically identify a privacy area in the image, and perform the privacy area in the original image. Occlusion or blurring to get a masked image.
  • the original image is encoded and encapsulated, and a first multimedia stream encapsulated with the original image is obtained, and the masked image is encoded and encapsulated, so that a second multimedia stream encapsulated with the masked image can be obtained.
  • the first multimedia stream or the second multimedia stream is selectively sent to the playing end by identifying the viewing right of the playing end.
  • the original image can be played by decapsulating and decoding the first multimedia stream
  • the second multimedia stream is received, The second multimedia stream is decapsulated and decoded, and the shadow image can be played.
  • the embodiment of the present application provides a method and apparatus for displaying an image based on privacy masking.
  • the technical solution is as follows:
  • a method for displaying an image based on privacy masking comprising:
  • the privacy masking area information is used to indicate an area in the original image that needs to be shielded;
  • the privacy de-encryption permission information is used to indicate that the original image does not need to be shielded from privacy, and the privacy is hidden
  • the information is generated according to the received authentication information, where the authentication information is used to authenticate the display permission of the original image
  • the original image is privately masked based on the privacy masking area information, and a masked image is obtained, and the masked image is displayed;
  • the method further includes:
  • the original image is displayed when there is no need to privacy mask the original image.
  • the original image is an image captured by the image collecting end or the image captured by the image collecting end is according to the first masking area information. And performing an original masking image obtained by privacy masking, wherein the first masking area information is configured by the image collecting end.
  • the determining, according to whether the privacy masking permission information is stored, determining whether the original image needs to be masked by the privacy includes:
  • the method before the determining whether the privacy de-encryption permission information is stored, the method further includes:
  • the privacy de-encryption permission information is generated and stored.
  • the privacy masking area information includes first masking area information and/or second masking area information, where the first masking area information is The image capturing end is configured, and the second masking area information is obtained by identifying the original image;
  • Determining whether it is necessary to perform privacy masking on the original image according to whether the privacy masking permission information is stored including:
  • the first masking permission information is used to indicate that the first masking area does not need to be performed Privacy masking, the first masking area is an area indicated by the first masking area information;
  • the second masking permission information is used to indicate that the second masking area does not need to be performed Privacy masking, where the second masking area is an area indicated by the second masking area information;
  • the first de-masking permission information and the second de-masking permission information are privacy de-encryption permission information.
  • the method further includes:
  • the first de-masking authority is used to indicate that the first masking area in the original image is Permission to not mask privacy;
  • the second de-masking authority is used to indicate that the second masking region in the original image is Permission to not mask privacy;
  • the first de-masking authority and the second de-masking authority are the rights carried in the original image or the set default permissions.
  • the acquiring the original image to be masked provided by the image collecting end and acquiring the privacy masking area information of the original image includes:
  • the original image is identified to obtain the privacy masking area information.
  • the acquiring the original image to be masked and the privacy masking area information of the original image provided by the image collecting end includes:
  • a method for displaying an image based on privacy masking comprising:
  • the original image and the privacy masking area information are provided to the playing end, and the playing end determines whether to perform privacy masking on the original image based on the privacy masking area information.
  • the acquiring the original image to be obscured includes:
  • Acquiring an image captured on the monitoring scene acquiring the configured first occlusion area information; performing privacy occlusion on the captured image according to the first occlusion area information to obtain an original occlusion image; determining the original occlusion image as the original image.
  • the providing the original image and the privacy masking area information to the playing end includes:
  • the multimedia stream is provided to the play end.
  • the obtaining The privacy masking area information of the original image includes:
  • the method before the providing the original image and the privacy masking area information to the playing end, the method further includes:
  • the privacy masking area information of the original image is the first masking area information and/or the second masking area information
  • setting a right that does not perform privacy masking on the original image is set as a privacy masking authority; or
  • setting a right of not masking privacy to the first masking area in the original image is set to Setting a first de-obscuring authority and/or setting a right that does not perform privacy masking on the second obscured area in the original image as a second de-masking authority, where the first obscured area is indicated by the first obscured area information
  • the area, the second masking area is an area indicated by the second masking area information.
  • an apparatus for displaying an image based on privacy masking comprising:
  • An acquiring module configured to acquire an original image to be masked provided by an image collecting end and privacy masking area information of the original image, where the privacy masking area information is obtained by the original image or obtained from the image collecting end
  • the privacy masking area information is used to indicate an area in the original image that needs to be shielded
  • a first determining module configured to determine, according to whether the privacy masking permission information is stored, whether to mask privacy of the original image, where the privacy masking permission information is used to indicate that the original image does not need to be shielded from privacy. And the privacy de-encryption permission information is generated according to the received authentication information, where the authentication information is used to authenticate the display permission of the original image;
  • a first display module configured to perform privacy masking on the original image based on the privacy masking area information, obtain a masked image, and display the masked image, when privacy masking of the original image is required.
  • the device further includes:
  • a second display module configured to display the original image when privacy masking of the original image is not required.
  • the original image is an image captured by the image collecting end, or is configured to perform privacy screening on the captured image according to the first masking area information.
  • the original masking image is configured by the image capturing end.
  • the first determining module includes:
  • a first determining unit configured to determine whether the privacy de-encryption permission information is stored
  • a first determining module configured to determine, when the privacy de-encryption permission information is stored, that privacy masking of the original image is not required;
  • the second determining module is configured to determine that the original image needs to be privacy-masked when the privacy de-encryption permission information is not stored.
  • the device further includes:
  • a first receiving module configured to receive the authentication information
  • a second judging module configured to determine whether the authentication information conforms to a privacy de-encryption authority, where the privacy de-obscuring permission is used to indicate that the user does not perform privacy obscuration on the original image, and the privacy de-encryption permission is The permission carried in the original image or the default permission set;
  • a first generating module configured to generate and store the privacy de-encryption permission information when the authentication information conforms to the privacy de-encryption permission.
  • the privacy masking area information includes first masking area information and/or second masking area information, where the first masking area information is The image capturing end is configured, and the second masking area information is obtained by identifying the original image;
  • the first determining module includes at least one of the following units:
  • a third determining unit configured to determine, when the first occlusion permission information is stored, that privacy occlusion is not required for the first occlusion region in the original image, where the first occlusion permission information is used to indicate that The first occlusion area performs privacy occlusion, and the first occlusion area is an area indicated by the first occlusion area information;
  • a fourth determining unit configured to: when the second occlusion permission information is stored, determine that the second occlusion area in the original image does not need to be occluded, the second occlusion permission information is used to indicate that the The second shielding area performs privacy shielding, and the second shielding area is an area indicated by the second shielding area information;
  • the first de-masking permission information and the second de-masking permission information are privacy de-encryption permission information.
  • the device further includes:
  • a second receiving module configured to receive the authentication information
  • a second generating module configured to generate and store the first de-masking permission information when the authentication information meets the first de-masking authority, where the first de-masking authority is used to indicate that the original image is in the original image
  • the first obscured area does not have privacy privacy
  • a third generating module configured to generate and store the second de-masking permission information when the authentication information meets the second de-masking authority, where the second de-masking authority is used to indicate that the original image is in the original image
  • the second occlusion area does not have privacy privacy
  • the first de-masking authority and the second de-masking authority are the rights carried in the original image or the set default permissions.
  • the acquiring module includes:
  • a first acquiring unit configured to acquire a first multimedia stream generated by the image collecting end, where the first multimedia stream is obtained by encapsulating the original image by the image collecting end;
  • a first decapsulation unit configured to decapsulate the first multimedia stream to obtain a first encryption Code stream
  • a first decrypting unit configured to decrypt the first encrypted stream by using a code stream key of the first encrypted stream to obtain a first compressed code stream
  • a first decoding unit configured to decode the first compressed code stream to obtain the original image
  • an identifying unit configured to identify the original image to obtain the privacy masking area information.
  • the acquiring module includes:
  • a second acquiring unit configured to acquire a second multimedia stream generated by the image collecting end, where the second multimedia stream is a privacy masking area of the original image and the original image by the image collecting end Information is encapsulated;
  • a second decapsulation unit configured to decapsulate the second multimedia stream, to obtain a second encryption stream and the privacy mask area information
  • a second decrypting unit configured to decrypt the second encrypted stream by using a code stream key of the second encrypted stream to obtain a second compressed code stream
  • a second decoding unit configured to decode the second compressed code stream to obtain the original image.
  • an apparatus for displaying an image based on privacy masking comprising:
  • a first acquiring module configured to acquire an original image to be masked
  • a second acquiring module configured to acquire privacy masking area information of the original image, where the privacy masking area information is used to indicate an area in the original image that needs to be shielded;
  • the providing module is configured to provide the original image and the privacy masking area information to the playing end, and the playing end determines whether to perform privacy masking on the original image based on the privacy masking area information.
  • the first acquiring module includes at least one of the following units:
  • a first determining unit configured to acquire an image captured on the monitoring scene, and determine the captured image as the original image
  • a second determining unit configured to acquire an image captured on the monitoring scene; acquire the configured first masking area information; perform privacy masking on the captured image according to the first masking area information, to obtain an original masking image; The shadow image is determined as the original image.
  • the providing module includes:
  • a coding unit configured to encode the original image to obtain a compressed code stream
  • An encryption unit configured to encrypt the compressed code stream to obtain a password-added stream
  • An encapsulating unit configured to encapsulate the encrypted password stream and the privacy masking area information to obtain a multimedia stream
  • a providing unit configured to provide the multimedia stream to the playing end.
  • the second acquiring module includes at least one of the following units:
  • a third determining unit configured to determine the configured first occlusion area information as privacy occlusion area information of the original image
  • a fourth determining unit configured to identify the original image, obtain second masking area information, and determine the second masking area information as privacy masking area information of the original image.
  • the device further includes:
  • a first setting module configured to: when the privacy masking area information of the original image is the first masking area information and/or the second masking area information, set a permission for privacy shielding of the original image Include permissions for privacy; or,
  • a second setting module configured to: when the privacy masking area information of the original image is the first masking area information and/or the second masking area information, not to the first masking area in the original image
  • the permission to perform privacy masking is set as the first de-masking authority and/or the permission to not mask the second masking area in the original image is set as the second de-masking authority
  • the first obscured area is the An area indicated by the first occlusion area information, where the second occlusion area is an area indicated by the second occlusion area information.
  • a play end includes: a housing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside a space enclosed by the housing, The processor and the memory are disposed on the circuit board; the power circuit is configured to supply power to each circuit or device of the play end; the memory is configured to store executable program code; The executable program code stored in the memory to perform the following steps:
  • the privacy masking area information is obtained by the original image or obtained from the image collecting end, the privacy The occlusion area information is used to indicate an area in the original image that needs to be shielded;
  • the privacy de-encryption permission information is used to indicate that the original image does not need to be shielded from privacy, and the privacy is hidden
  • the information is generated according to the received authentication information, where the authentication information is used to authenticate the display permission of the original image
  • the original image is privacy-masked based on the privacy masking area information, a masked image is obtained, and the masked image is displayed.
  • an image collecting end comprising: a housing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside the space enclosed by the housing
  • the processor and the memory are disposed on the circuit board;
  • the power supply circuit is configured to supply power to each circuit or device of the image acquisition end;
  • the memory is configured to store executable program code;
  • the program performs the following steps by running executable program code stored in the memory:
  • the original image and the privacy masking area information are provided to the playing end, and the playing end determines whether to perform privacy masking on the original image based on the privacy masking area information.
  • an executable program code is provided for performing the following steps at runtime:
  • the privacy masking area information is obtained by the original image or obtained from the image collecting end, the privacy The occlusion area information is used to indicate an area in the original image that needs to be shielded;
  • the privacy de-encryption permission information is used to indicate that the original image does not need to be shielded from privacy, and the privacy is hidden
  • the information is generated according to the received authentication information, where the authentication information is used to authenticate the display permission of the original image
  • the original image is privacy-masked based on the privacy masking area information, a masked image is obtained, and the masked image is displayed.
  • an executable program code is provided for performing the following steps at runtime:
  • the original image and the privacy masking area information are provided to the playing end, and the playing end determines whether to perform privacy masking on the original image based on the privacy masking area information.
  • a storage medium for storing executable program code, the executable program code being operative to perform the following steps:
  • the privacy masking area information is obtained by the original image or obtained from the image collecting end, the privacy The occlusion area information is used to indicate an area in the original image that needs to be shielded;
  • the privacy de-encryption permission information is used to indicate that the original image does not need to be shielded from privacy, and the privacy is hidden
  • the information is generated according to the received authentication information, where the authentication information is used to authenticate the display permission of the original image
  • a storage medium for storing executable program code, the executable program code being operative to perform the following steps:
  • the original image and the privacy masking area information are provided to the playing end, and the playing end determines whether to perform privacy masking on the original image based on the privacy masking area information.
  • the original image to be masked provided by the image collecting end is obtained, and the privacy masking area information of the original image is obtained, and the privacy masking area information may be obtained by identifying the original image or obtained from the image collecting end.
  • the privacy masking area information masks the privacy of the original image to obtain a masked image.
  • the image collecting end only needs to provide an original image, and the playing end can determine whether the original image provided by the image collecting end needs to be shielded by the external authentication, thereby realizing the protection of the user privacy, since the image collecting end does not need to provide one more.
  • the original image and a shadow image are two images, so the cost of storage or transmission is low, thereby saving storage resources and network resources of the image collection end.
  • FIG. 1A is a schematic diagram of an image acquisition and playback system provided by an embodiment of the present application.
  • FIG. 1B is a schematic structural diagram of an image collecting end 10 according to an embodiment of the present application.
  • FIG. 1C is a schematic structural diagram of another image collecting end 10 according to an embodiment of the present application.
  • FIG. 1D is a schematic structural diagram of another image collecting end 10 according to an embodiment of the present application.
  • FIG. 1E is a schematic structural diagram of a play end 20 according to an embodiment of the present application.
  • FIG. 1F is a schematic structural diagram of another play end 20 according to an embodiment of the present application.
  • FIG. 1G is a schematic structural diagram of another play end 20 according to an embodiment of the present application.
  • FIG. 2 is a flowchart of a method for displaying an image based on privacy masking according to an embodiment of the present application
  • FIG. 3 is a flowchart of another method for displaying an image based on privacy masking according to an embodiment of the present application
  • FIG. 4 is a block diagram of an apparatus for displaying an image based on privacy masking according to an embodiment of the present application
  • FIG. 5 is a block diagram of another apparatus for displaying an image based on privacy masking provided by an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a play end 600 according to an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of an image collection end 700 according to an embodiment of the present application.
  • the image collecting and playing system includes an image collecting end 10 and a playing end 20.
  • the image collecting end 10 and the playing end 20 may not be connected, and may be connected through a wired network or a wireless network, as shown in FIG. 1A, which is not limited in this embodiment of the present application.
  • the image collecting end 10 is configured to collect an image and provide the image to the playing end 20, and the playing end 20 is configured to display the image.
  • the manner of providing may include: the image collecting end 10 collects an image and stores the image, and the playing end 20 acquires the stored image from the image collecting end 10, for example, copies the stored image; or the image collecting end 10 collects the image and the collected image Send to the playback terminal 20.
  • the image captured and played in the image capturing and playing system may be only one image, such as a photo taken; or the image may be a frame image in the multimedia video, that is, the image.
  • the collecting end can collect the video, and the video is provided to the playing end, and is played by the playing end. This embodiment does not limit the video.
  • the image capturing and playing system can also be a video codec system.
  • the image collecting end 10 can be a collecting and encoding end, and can acquire an image and encode the image to obtain a multimedia stream.
  • the playing end 20 can be The decoding player can decode and play the multimedia stream provided by the acquisition encoder.
  • the image capturing and playing system may be a video monitoring system.
  • the image capturing end 10 may be a surveillance camera, such as a fixed camera, or a moving camera such as a dome or a pan/tilt.
  • the playing end 20 may have A terminal that displays functions, such as a mobile phone, a computer, a tablet, and the like.
  • the image capturing and playing system can also be a video conferencing system, a video broadcast system, etc.
  • the image collecting end 10 can be a device with a camera
  • the playing end 20 can be a mobile phone, a computer, a set top box, a television, Digital media player, video game console, etc.
  • the embodiment of the present application is only taking the image capturing end 10 and the playing end 20 as two devices.
  • the collecting end 10 and the playing end 20 can also be integrated into one device and have a collecting end. 10 and the function of the player 20.
  • the integrated device can be a camera that can capture images as well as display captured images.
  • the current privacy masking methods mainly include two categories:
  • the user can set a part of the image to be an area to be shaded, that is, a privacy mask area, through a specific setting interface.
  • a privacy mask area For example, in a scenario of monitoring a public place, in order to avoid exposure of indoor doors and windows to expose indoor privacy, a fixed area such as a door and window may be set as a privacy masking area.
  • the currently set area can be directly used as a privacy mask area to be masked in the image; for the moving camera, the captured image changes as the camera rotates. Therefore, after the user sets the privacy masking area under a certain initial position, the active camera will also display the initial setting area in the current image according to the information of the magnification, orientation, etc., as the camera rotates. The location, and the converted location area is used as a privacy masking area in the current image that needs to be masked.
  • Intelligently identify the obscured area Intelligent recognition method such as computer vision is used to intelligently detect the collected original image, identify the moving area or specific target, and identify the moving area.
  • the domain or the area where the specific target is located serves as a privacy masking area that needs to be obscured. For example, a person or an area in which an image appears in an image can be identified as a privacy masked area.
  • the privacy masking area of the configured or identified privacy masking area is processed before the encoding compression, so that the player can only display the masked image and cannot obtain the original image when needed. Extract key information.
  • the image capturing end 10 can acquire the original image to be masked, and directly provide the original image to the playing end 20, and the original image is played by the playing end 20. Identifying, obtaining privacy masking area information of the original image, and determining whether to mask the original image based on the privacy masking area information.
  • the original image to be masked is obtained, and the privacy masking area information of the original image is obtained, and the original image and the privacy masking area information are provided to the playing end 20, and the playing end 20 determines whether the content is based on the privacy masking area information.
  • the original image is shaded by privacy.
  • FIG. 1B is a schematic structural diagram of an image collecting end 10 according to an embodiment of the present disclosure.
  • the image collecting end 10 includes an acquiring module 11, an encoding module 12, an encryption module 13, a multimedia encapsulating module 14, and an output interface 15.
  • the acquisition module 11 is configured to sense and image the optical information, that is, convert the scene light information into an image, and the output thereof is generally original bitmap image information, such as YUV (a color standard) or RGB (a color standard) color mode. Wait.
  • the acquisition module 11 can be a photographic camera module or device, such as a camera.
  • the encoding module 12 is configured to encode the input image to form a compressed code stream to reduce the amount of data transmitted.
  • the encryption module 13 is configured to encrypt the transmitted information to ensure the security of the information.
  • the multimedia encapsulation module 14 is configured to mix and encapsulate information of different attributes such as video, audio, and structured descriptors (such as subtitles) to obtain a multimedia stream, so as to facilitate control and synchronization of the streaming media.
  • attributes such as video, audio, and structured descriptors (such as subtitles)
  • the output interface 15 is configured to communicate with other devices and output information to other devices, which may be a transmitter or the like. For example, an image or a multimedia stream or the like can be transmitted to the playback terminal 20.
  • the image collecting end 10 may further include a masking module 16 configured to acquire privacy masking area information configured in the image collecting end 10, according to the privacy masking The area information masks the privacy masked area in the original image and outputs the masked image.
  • the masking module 16 may also obtain the configured privacy masking area information, and output the configured privacy masking area information to the multimedia encapsulating module 14 so that the multimedia encapsulating module 14 encrypts the configured privacy masking area information and the encryption module 13 The image is encapsulated.
  • the image collecting end 10 may include an acquiring module 11, an encoding module 12, an encryption module 13, a multimedia encapsulating module 14, and an output interface. 15 and identification module 17.
  • the identification module 17 is configured to intelligently recognize the input image, and identify the motion area or the location information of the specific target.
  • the embodiment of the present application does not specifically limit the smart identification algorithm used, and preferably uses a background modeling + motion detection algorithm, or a specific target detection algorithm.
  • the output of the identification module 17 is the area information of the target in the image, and the form of the information may be a polygon vertex coordinate, a rectangular diagonal vertex coordinate, or the like. For example, when the area where the target is located is a rectangle, the upper left pixel coordinate (x1, y1) and the lower right pixel coordinate (x2, y2) of the rectangle may be used as an output result of the recognition module 17.
  • the identification module 17 can intelligently identify the collected image, and output the identified privacy masking area information to the multimedia encapsulation module 14 so that the multimedia encapsulation module 14 encrypts the identified privacy masking area information.
  • the image encrypted by module 13 is encapsulated.
  • the privacy masking area information configured by the image capturing end 10 is referred to as first masking area information
  • the privacy masking area information obtained by identifying the image by the identifying module 17 is referred to as second masking area information.
  • FIG. 1D is a schematic structural diagram of another image collecting end 10 according to an embodiment of the present application.
  • the image collecting end 10 may include an acquiring module 11, an encoding module 12, an encryption module 13, a multimedia encapsulating module 14, and an output interface. 15.
  • the masking module 16 is configured to acquire the privacy masking area information configured in the image collecting end 10, that is, the first masking area information, and send the first masking area information to the masking information synthesizing module 18.
  • the identification module 17 is configured to identify the image acquired by the acquisition module 11 and identify the image
  • the obtained privacy masking area information, that is, the second masking area information is sent to the masking information synthesizing module 18.
  • the occlusion information synthesizing module 18 is configured to obtain multiple forms of privacy occlusion area information, and synthesize various forms of privacy occlusion area information to obtain synthesized privacy occlusion area information. For example, when the image capturing end 10 is compatible with the plurality of privacy masking modes, such as the manual configuration and the smart identification, the masking information synthesizing module 18 can respectively acquire the first masking area information sent by the masking module 16 and the second masking identified by the identifying module 17. The area information is combined with the first masking area and the second masking area information to obtain synthesized privacy masking area information.
  • the embodiment of the present application is only described by taking the image collecting end 10 as the above module as an example, and in actual application, the above module may be correspondingly increased, decreased, and transformed according to actual needs.
  • FIG. 1E is a schematic structural diagram of a playing end 20 according to an embodiment of the present application.
  • the image collecting end 10 shown in FIG. 1B can be combined with an image collecting and playing system.
  • the play end 20 includes an input interface 21, a multimedia decapsulation module 22, a decryption module 23, a decoding module 24, an identification module 25, an authentication module 26, an image synthesis module 27, and a display module 28.
  • the input interface 21 is configured to communicate with other devices to obtain information sent by other devices, and may be a receiver or the like. For example, an image or a multimedia stream or the like transmitted by the image capturing terminal 10 can be received.
  • the multimedia decapsulation module 22 corresponds to the multimedia encapsulation module 14 and is configured to decapsulate the received multimedia stream to obtain information of different attributes such as images and audio before encapsulation.
  • the multimedia encapsulation/decapsulation module may adopt a general multimedia container standard, such as MPEG2TS/PS, RTP, or MP4 for storing files, etc., which is not limited by the embodiment of the present application. It should be noted that when encrypting a video stream, the multimedia encapsulation/decapsulation module needs to adopt an encapsulation/decapsulation standard that supports private information extension, such as MPEG2TS.
  • the decryption module 23 corresponds to the encryption module 13 and is configured to decrypt the received encrypted information.
  • the encryption/decryption module may adopt a common information encryption standard, such as AES, SM4, etc., which is not limited in this embodiment.
  • the key information used for encryption and decryption in the embodiment of the present application may be separately built in the encryption module and the decryption module at both ends, and the user is invisible and unknown, and is used to control the playback of the image by using a specially matched playback device. The three-party player cannot be played.
  • the decoding module 24 is corresponding to the encoding module 12, and is configured to solve the encoded compressed code stream. Code, obtain a restored image for display.
  • the coding/decoding module may adopt a common coding standard, such as H.264/AVC, H.264/HEVC, etc., which is not limited in this embodiment of the present application.
  • the function of the identification module 25 is similar to that of the identification module 17 in the image collecting end 10 described above, and details are not described herein again.
  • the authentication module 26 is configured to perform authentication on the received authentication information. If the authentication information determines that the authentication information meets the permission requirement, the de-encryption permission information may be generated and sent to indicate that privacy masking is not required. If the permission requirement is not met, the demasking permission information may be generated or the unmasking information may be generated to indicate that privacy obscuration is required.
  • the image synthesizing module 27 is configured to receive the privacy masking area information of the original image and the original image. When privacy masking is required, the original image is masked based on the privacy masking area information, and the masking image is output; when privacy masking is not required, Output the original image.
  • the original image may be an image directly collected by the image collecting end 10, that is, an unmasked image, or may be an original masking image obtained by performing privacy masking on the captured image according to the first masking area information.
  • the display module 28 is for displaying images or videos.
  • the display module 28 can be a variety of display devices, such as a liquid crystal display (LCD), a plasma display, an organic light emitting diode (OLED) display, or other types of display devices.
  • LCD liquid crystal display
  • plasma display a plasma display
  • OLED organic light emitting diode
  • FIG. 1F is a schematic structural diagram of another play end 20 according to an embodiment of the present application.
  • the play end 20 includes an input interface 21, a multimedia decapsulation module 22, a decryption module 23, a decoding module 24, a masking information parsing module 29, an authentication module 26, an image synthesizing module 27, and a display module 28.
  • the occlusion information parsing module 29 is configured to parse the privacy occlusion area information. Since the privacy masking area information provided by the image collecting end 10 may be the privacy masking area information in the form of a computer language, the privacy masking area information of the computer language form needs to be parsed on the playing end to obtain the privacy that the image synthesizing module 27 can recognize. The area information is masked so that the image synthesizing module 27 learns the range of areas in the image that need to be masked based on the privacy mask area information, thereby preparing for privacy masking in the image.
  • the occlusion area information parsing module 29 can parse the first occlusion area information provided by the image collection end 10; for FIG. 1C, the occlusion area information parsing module 29 can provide the second id of the image collection end 10.
  • Masking area information for parsing; for Figure 1D, the mask The masked area information parsing module 29 can parse the synthesized privacy masking area information provided by the image collecting end 10.
  • FIG. 1G is a schematic structural diagram of another playback terminal 20 according to an embodiment of the present disclosure.
  • the playback terminal 20 includes an input interface 21, a multimedia decapsulation module 22, a decryption module 23, a decoding module 24, and an identification module 25.
  • the playing end 20 can parse the first masking area information provided by the image collecting end 10 through the masking information parsing module 29, and identify the image by the identifying module 25 to obtain the second masking area information, and then pass the The occlusion information synthesizing module 30 synthesizes the first occlusion region information and the second occlusion region information to obtain the synthesized privacy occlusion region information, so that the image synthesizing module 27 is based on the synthesized privacy occlusion region information sent by the occlusion information synthesizing module 30. It is judged whether or not the image decoded by the decoding module 24 needs to be masked.
  • the embodiment of the present application is only described by the example that the playing end 20 includes the foregoing module, and in actual applications, the foregoing modules may be correspondingly increased, decreased, and transformed according to actual needs.
  • FIG. 2 is a flowchart of a method for displaying an image based on privacy masking according to an embodiment of the present application. Referring to FIG. 2, the method includes:
  • Step 201 The image collecting end acquires an original image to be masked.
  • the original image may be an image captured by the image capturing end, or may be an original image obtained by masking the captured image according to the first masking area information, where the first masking area information is configured for the image collecting end.
  • the manner of obtaining the original image to be masked may include the following two types:
  • the first way acquiring an image taken on the monitoring scene, and determining the captured image as the original image. That is, the image collecting end can convert the light information of the monitoring scene into an image by shooting, and perform no occlusion or blurring processing on the image, thereby obtaining the original image.
  • the second method is: acquiring an image captured on the monitoring scene; acquiring the configured first masking area information; performing privacy masking on the captured image according to the first masking area information to obtain an original masking image; determining the original masking image as The original image.
  • the first occlusion area information is privacy occlusion area information determined based on a manual configuration of the user.
  • the first occlusion area information is the privacy occlusion area information manually configured by the user, such as the shadow rectangle coordinate of the user input saved by the image collection end, the shadow polygon coordinate, and the like;
  • the first occlusion area information is the privacy occlusion area information obtained by performing activity coordinate conversion on the privacy occlusion area information manually configured by the user.
  • the image collecting end can obtain the privacy masking area information manually configured by the user, and mask the captured image according to the manually configured privacy masking area information to obtain the original image.
  • Step 202 The image collection end acquires privacy masking area information of the original image, where the privacy masking area information is used to indicate an area in the original image that needs to be shielded.
  • the current privacy masking method includes two methods: manually configuring a privacy masking area and intelligently identifying a privacy masking area. Accordingly, obtaining the privacy masking area information of the original image may include any one of the following manners:
  • the first manner determining the configured first occlusion area information as the privacy occlusion area information of the original image.
  • the configured first occlusion region information may be obtained, and the first occlusion region information is determined as the privacy occlusion region information of the original image.
  • the second method identifying the original image, obtaining second masking area information, and determining the second masking area information as privacy masking area information of the original image.
  • the second occlusion area information may be coordinate information of the motion area or the specific target area obtained by the recognition module 17 after identifying the motion area or the specific target in the original image.
  • the original image when the original image is the captured image or the original masked image, the original image may be identified to obtain second masked region information, and the second masked region information is used as a privacy masking region of the original image. information.
  • the third method obtaining the first masked area information of the configuration, and identifying the original image, Obtaining the second occlusion area information, synthesizing the first occlusion area information and the second occlusion area information, to obtain the synthesized privacy occlusion area information, and determining the synthesized privacy occlusion area information as the privacy occlusion area information of the original image .
  • the configured first occlusion region information may be obtained, and the first occlusion region information is determined as the privacy occlusion region information of the original image.
  • the manner of synthesizing the first occlusion area information and the second occlusion area information may include: determining the union of the first occlusion area information and the second occlusion area information as the privacy occlusion area information; Or, the first masking area information and the second masking area information are separately described separately, and the first masking area information and the second masking area information are collected together to obtain privacy.
  • Mask area information may include: determining the union of the first occlusion area information and the second occlusion area information as the privacy occlusion area information; Or, the first masking area information and the second masking area information are separately described separately, and the first masking area information and the second masking area information are collected together to obtain privacy.
  • the image collecting end may also set different privacy masking rights for different privacy masking area information, or set different privacy masking rights for different privacy masking area information, so as to limit the playing end to only have the image.
  • the privacy set by the collection side is de-encrypted, the original image without privacy masking of the corresponding area can be displayed.
  • Specific settings can include the following:
  • the privacy masking area information of the original image is the first masking area information and/or the second masking area information
  • the right that does not perform privacy masking on the original image is set as the privacy masking authority.
  • a unified privacy masking authority is set for the privacy masking area information.
  • the original image may not be masked by privacy, thereby implementing arbitrary masking areas in the original image. Go to cover.
  • the second mode is: when the privacy masking area information of the original image is the first masking area information and/or the second masking area information, setting the right of not masking the first masking area in the original image to The first occlusion authority and/or the privilege that does not perform privacy occlusion on the second occlusion area in the original image is set as the second occlusion authority, where the first occlusion area is an area indicated by the first occlusion area information, The second masking area is an area indicated by the second masking area information.
  • different de-masking rights are set for different privacy masking area information.
  • the playing end has the corresponding de-masking authority, the corresponding masking area in the original image can be not masked by privacy, thereby implementing the corresponding masking. Permission to demask the corresponding masked area in the original image.
  • the privacy masking area information and the corresponding privacy masking authority may be combined to obtain the combined masking area information, and the playing end may parse the combined masking area information to obtain the privacy masking area information of the original image and the corresponding privacy. Remove the permissions.
  • the de-masking permission may be set only in the specified frame image in the multimedia stream, when it is determined that the playing end has the specified frame image.
  • the specified frame may be the first frame or the I frame, the P frame, and the like in the multimedia stream, which is not limited in this embodiment.
  • the embodiment of the present application only sets the privacy de-encryption permission for the original image in the image collection end, and the original image can be de-masked when the playback end has the privacy de-encryption permission corresponding to the original image.
  • the image collection end may not set the corresponding privacy de-encryption permission for the original image, but the original image provided by the playback end for all image acquisition ends is set to a unified privacy mask. Permission, when the playback end has the corresponding privacy de-encryption permission, all the images provided by the image collection end can be demasked.
  • Step 203 The image collecting end provides the original image and the privacy masking area information to the playing end.
  • the manner of providing the original image and the privacy masking area information to the playing end may include: storing the original image and the privacy masking area information, and acquiring, by the playing end, the stored original image from the image collecting end and The privacy masking area information, for example, copying the stored original image and the privacy masking area information from the image collecting end; or sending the original image and the privacy masking area information to the playing end.
  • the non-privileged playing end can prevent the original image from being displayed after the original image is acquired, resulting in user privacy leakage, and thus providing the original image and the privacy masking area information to Before the playing end, the image collecting end may further encrypt the original image, so that the encrypted original image and the privacy masking area information are provided to the playing end.
  • the image collecting end may further encrypt the original image, so that the encrypted original image and the privacy masking area information are provided to the playing end.
  • the original image may be encrypted by using a specific key, and the original image can be decrypted only by using the specific key to obtain the original image.
  • the process of providing the original image and the privacy masking area information to the playing end may include: encoding the original image to obtain a compressed code stream; and encrypting the compressed code stream to obtain a cryptographic stream; Encapsulating the encrypted stream and the privacy masking area information to obtain a multimedia stream; and providing the multimedia stream to the playing end.
  • the encryption stream and the privacy mask area information are encapsulated to obtain a multimedia stream, and the method further includes: adding the password stream, the privacy mask area information, and information of other different attributes such as audio and structured descriptors (such as subtitles). Hybrid encapsulation to get a multimedia stream.
  • the embodiment of the present application is only an example of encrypting a compressed code stream, and in an actual application, the multimedia stream may be encrypted to implement protection on the original image, and accordingly, the receiving end receives After the encrypted multimedia stream, the encrypted multimedia stream needs to be decrypted to obtain the multimedia stream.
  • Step 204 The playing end acquires the original image provided by the image collecting end and the privacy masking area information of the original image.
  • the playing end may obtain the original image and the privacy masking area information from the image collecting end, and may also receive the original image and the privacy masking area information sent by the playing end, which is not limited in this embodiment of the present application.
  • receiving the original image and the privacy masking area information sent by the playing end includes: the playing end acquires the original image from the image collecting end, and the playing end identifies the original image to obtain the privacy masking area information.
  • the acquiring the original image to be masked and the privacy masking area information of the original image provided by the image collecting end may include: acquiring a multimedia stream generated by the image collecting end, where the multimedia stream is the image capturing end and the original image
  • the privacy masking area information of the original image is encapsulated; the multimedia stream is decapsulated to obtain the encrypted stream and the privacy masked area information; and the encrypted stream is decrypted by the code stream key of the encrypted stream to obtain compression a code stream; decoding the compressed code stream to obtain the original image.
  • the original image to be masked provided by the image acquisition end is acquired.
  • the privacy masking area information of the original image may include: acquiring a multimedia stream generated by the image collecting end, the multimedia stream is obtained by encapsulating the original image by the image collecting end; decapsulating the multimedia stream to obtain a password Streaming; decrypting the encrypted stream by the code stream key of the encrypted stream to obtain a compressed code stream; decoding the compressed code stream to obtain the original image; and identifying the original image to obtain privacy of the original image Mask area information.
  • Step 205 The playing end determines whether the privacy masking of the original image needs to be performed according to whether the privacy de-encryption permission information is stored.
  • the privacy de-masking permission information is used to indicate that the original image does not need to be shielded from privacy.
  • the privacy de-encryption permission information may be generated according to the received authentication information, where the authentication information is used to authenticate the display permission of the original image. That is, the playing end can determine whether it is necessary to perform privacy masking on the original image by authenticating the authentication information.
  • determining whether the privacy masking of the original image needs to be performed according to whether the privacy masking permission information is stored may include: determining whether the privacy masking permission information is stored; and storing the privacy masking permission When the information is determined, it is determined that the original image does not need to be masked by privacy; when the privacy masking permission information is not stored, it is determined that the original image needs to be masked by privacy.
  • determining whether to store the privacy masking permission information further comprises: receiving the authentication information; determining whether the authentication information conforms to the privacy de-encrypting authority, the privacy de-obscuring permission is used to indicate that the original image is not masked by privacy Permission, the privacy de-encryption permission is the permission carried in the original image or the default permission set;
  • the privacy de-encryption permission information is generated and stored.
  • the playing end may further generate and store privacy de-encryption information, where the privacy de-enhancement information is used to indicate that the original image needs to be privacy-masked.
  • the privacy de-enhancement information is used to indicate that the original image needs to be privacy-masked.
  • the privacy masking area information includes first masking area information and/or second masking area information. In this case, whether the original image needs to be determined according to whether the privacy masking permission information is stored.
  • Privacy masking can include:
  • the first de-masking permission information When the first de-masking permission information is stored, it is determined that there is no need to perform privacy masking on the first masking area in the original image, and the first de-masking permission information is a privacy de-encryption permission information, and the first de-masking permission information For indicating that there is no need to perform privacy masking on the first masking area, where the first masking area is an area indicated by the first masking area information; and/or,
  • the second de-masking permission information is stored, it is determined that there is no need to perform privacy masking on the second masking area in the original image, the second de-masking permission information is a privacy de-encryption permission information, and the second de-masking permission information It is used to indicate that there is no need to perform privacy masking on the second masking area, and the second masking area is an area indicated by the second masking area information.
  • determining whether the privacy masking of the original image is needed may include: determining whether the first masking permission information is stored; When the first de-masking permission information is stored, it is determined that there is no need to perform privacy masking on the first masking area in the original image; when the first de-masking permission information is not stored, determining that it is needed in the original image The first masking area performs privacy masking.
  • determining whether the privacy occlusion of the original image is required may include: determining whether the second occlusion permission information is stored; When the second de-encryption information is determined, it is determined that there is no need to perform privacy masking on the second masking area in the original image; when the second de-masking permission information is not stored, determining that the second in the original image is needed The masked area is covered by privacy.
  • determining whether the privacy masking of the original image is needed may include: determining whether the first masking permission information and the second masking permission information are stored. When storing the first de-masking permission information and the second de-masking permission information, determining that there is no need to perform privacy masking on the original image; when the first de-masking permission information is stored but not storing the second going When the license information is masked, it is determined that the second masking area in the original image needs to be privately masked; when the second masking permission information is stored but the first masking permission information is not stored, it is determined that the original is needed The first masking area in the image performs privacy masking; when the first masking permission information and the second masking permission information are not stored, determining that the first masking area and the second part in the original image are needed The masked area is covered by privacy.
  • determining whether to store the privacy masking permission information further comprises: receiving the authentication information; and when the authentication information conforms to the first de-masking authority, generating and storing the first de-masking permission information,
  • the first de-masking authority is used to indicate that the user has no privacy masking for the first masking area in the original image; when the authentication information meets the second de-masking authority, the second de-masking permission information is generated and stored.
  • the second de-masking authority is used to indicate that the second masking area in the original image does not have privacy masking; wherein the first de-masking right and the second de-masking right are carried in the original image Permissions or default permissions set.
  • the playing end may further generate and store the first de-enveloping information, where the first de-masking information is used to indicate that the first occlusion area needs to be performed.
  • the privacy masking is generated.
  • the second de-enveloping information is generated and stored, where the second de-enveloping information is used to indicate that the second obscured area needs to be privacy-masked.
  • the second masking area in the original image needs to be masked by privacy; when the second de-masking permission information is stored And determining, when the first de-encryption information is required, performing privacy masking on the first masking area in the original image; determining that the original image is needed when storing the first de-masking permission information and the second de-masking permission information
  • the first occlusion area and the second occlusion area in the privacy masking
  • the playing end may authenticate the received authentication information when receiving a display instruction for the original image or a play instruction for the multimedia stream.
  • the manner in which the playback end receives the authentication information may be a way of the built-in data signature dongle.
  • a USB key similar to the U shield is inserted in the playback end (a USB interface hardware device has a certain storage space and can be stored.
  • the private key and the data signature) correspondingly, by verifying the data signature to determine whether the authentication information conforms to the privacy to obscure the authority;
  • the manner of receiving the authentication information may also be a manner of receiving the authorization permission sent by the remote server.
  • the authentication permission may be verified to determine whether the authentication information meets the privacy de-encryption authority.
  • the form of information and the way of authentication are not limited.
  • Step 206 When privacy masking of the original image is required, the playing end performs privacy masking on the original image based on the privacy masking area information, obtains a masking image, and displays the masking image.
  • the privacy masking area performs privacy masking processing, for example, occluding or obscuring the privacy masking area to form image masking and protecting privacy.
  • the playing end may set all the pixels within the privacy masking area of the original image to 0, that is, paint black to form image masking; or blur the portion within the privacy masking area to form a mosaic or the like.
  • Step 207 When the original image is not required to be masked by privacy, the player displays the original image.
  • the playing end can directly perform the processing on the original image without using any processing, so that the user can easily extract key information from the original image.
  • the occlusion image can be displayed when privacy masking is required, and the original image can be displayed when privacy masking is not required, thereby realizing flexible display of the occlusion image and the original image as needed, thereby ensuring user privacy while ensuring Increased flexibility by extracting critical information from the original image when needed.
  • An image capturing and playing system composed of the image capturing end 10 shown in FIG. 1D and the playing end 20 shown in FIG. 1F is taken as an example.
  • the collecting module 11 in the image collecting end 10 shown in FIG. 1D can collect.
  • the encoding module 12 encodes the original image to obtain a compressed code stream, and sends the compressed code stream to the encryption module 13;
  • the encryption module 13 encrypts the compressed code stream to obtain a cryptographic stream, and sends the encrypted stream to the multimedia encapsulation module 14;
  • the identification module 17 can identify the second occlusion region information of the original image, and the second occlusion
  • the area information is sent to the occlusion information synthesizing module 18;
  • the occlusion module 16 can obtain the first occlusion area information manually configured by the user, and send the first occlusion area information to the occlusion information synthesizing module 18;
  • the input interface 21 in the playing end 20 shown in FIG. 1F can receive the image transmitting end 10 and send it.
  • the multimedia stream is sent to the multimedia decapsulation module 22; the multimedia decapsulation module 22 can decapsulate the multimedia stream, obtain the encrypted stream and the synthesized privacy masked area information, and send the encrypted stream to the decryption
  • the module 23 sends the synthesized privacy masking area information to the masking information parsing module 29; the decrypting module 23 can decrypt the encrypted stream by using the code stream key of the encrypted stream to obtain a compressed code stream, and compress the code stream.
  • the decoding module 24 can decode the compressed code stream to obtain an original image, and send the original image to the image synthesizing module 27;
  • the occlusion information parsing module 29 can parse the synthesized privacy occlusion region information.
  • the masking area information that can be recognized by the image synthesizing module 27 is obtained.
  • the authentication module 26 can also receive the authentication information sent by the external device before the playing end 20 plays the multimedia stream or during the playing of the multimedia stream.
  • the image synthesizing module 27 can determine the privacy mask from the received privacy based on the received privacy, and determine that the original image does not need to be shielded from the original image, and send the original image to the display module 28, the display module 28, the original image can be displayed; if the privacy confusing permission information is not received by the image synthesizing module 27, it can be determined that the original image needs to be occluded, and the original image is privacy based on the privacy occlusion region information. Obscuring, obtaining a shadow image, and transmitting the mask image to the display module 28, the display module 28 can display the mask image.
  • an image capturing and playing system composed of the image collecting end 10 shown in FIG. 1B and the playing end 20 shown in FIG. 1G is taken as an example, and the collecting module 11 in the image collecting end 10 shown in FIG. 1B can collect the image.
  • the image is sent to the encoding module 12 as an original image, and the first masked area information that is manually configured is obtained by the masking module 16 and sent to the multimedia encapsulating module 14; the original image is processed by the encoding module 12 and the encryption module 13 to obtain a password stream.
  • the multimedia encapsulation module 14 may encapsulate the encrypted stream and the first occlusion area information sent by the occlusion module 16 to obtain a multimedia stream, and send the multimedia stream to the play end 20 through the output interface 15.
  • the play end 20 shown in FIG. 1G can decapsulate the received multimedia stream by the multimedia decapsulation module 22 to obtain the first masked area information and the encrypted stream; the masking information parsing module 29 parses the first masked area information.
  • the identifiable first occlusion area information can be obtained;
  • the decryption module 23 and the decoding module 24 process the cryptographic stream to obtain the original image, and send the original image to the identification module 25;
  • the recognition module 25 identifies the original image, and can obtain Second occlusion area information;
  • the occlusion information synthesis module 30 performs the first occlusion area information and the second occlusion area information Synthesizing, the synthesized privacy masking area information can be obtained;
  • the image synthesizing module 27 can determine whether the original image sent by the encryption module 24 needs to be masked based on the synthesized privacy masking area information sent by the masking information synthesizing module 30, if the image synthesizing module 27 When the received privacy is removed from the
  • the privacy de-encryption permission information may be sent to the image synthesizing module 27, or only the privacy de-encryption permission may be sent to the image synthesizing module 27.
  • the information is stored by the image synthesis module 27 for the privacy de-encryption permission information, and based on the stored privacy de-encryption permission information, it is determined that the original image does not need to be privately masked, thereby directly displaying the original image.
  • the method provided by the embodiment of the present application can be applied to the field of video surveillance.
  • the privacy of the public can be protected as much as possible in the video recorded by the camera, or a problem may occur or In the case of illegal crimes, you can get enough clues from the video, which better meets the needs of different scenarios and improves flexibility.
  • it can be ensured that whether the manually configured privacy masking area information or the intelligently identified privacy masking area information can recover the masked original image after obtaining the permission, and for the playback end, There is no high performance requirement.
  • the original image to be masked provided by the image collecting end and the privacy masking area information of the original image may be acquired, and then according to whether the privacy masking permission information is stored, it is determined whether the The original image is masked by privacy.
  • privacy masking of the original image is required, the original image is masked based on the privacy masking area information to obtain a masked image.
  • the image collecting end only needs to provide an original image, and the playing end can determine whether the original image provided by the image collecting end needs to be shielded by the external authentication, thereby realizing the protection of the user privacy, since the image collecting end does not need to provide one more.
  • Original image and one shadow image The image is stored, so the cost of storage or transmission is low, which saves storage resources and network resources on the image acquisition end.
  • FIG. 3 is a flowchart of a method for displaying an image based on privacy masking according to an embodiment of the present application. Referring to FIG. 3, the method includes:
  • Step 301 The image collecting end acquires an original image to be masked.
  • the original image may be an image captured by the image capturing end, or may be an original image obtained by masking the captured image according to the first masking area information, where the first masking area information is configured for the image collecting end.
  • first masking area information is configured for the image collecting end.
  • Step 302 The image collecting end provides the original image to the playing end.
  • the image collecting end may directly provide the original image to the playing end without acquiring the privacy masking area of the original image.
  • the process of providing the original image to the playing end may include: encoding the original image to obtain a compressed code stream; encrypting the compressed code stream to obtain a encrypted stream; and encapsulating the encrypted stream , get the multimedia stream; provide the multimedia stream to the playing end.
  • the encrypted stream and the information of other different attributes such as audio and structured descriptors (such as subtitles) may be mixed and encapsulated to obtain a multimedia stream.
  • Step 303 The playing end acquires an original image provided by the image collecting end.
  • step 303 For the implementation process of the step 303, reference may be made to the step 204.
  • step 204 The embodiments of the present application are not described herein again.
  • Step 304 The playing end identifies the original image to obtain privacy masking area information.
  • the privacy masking area information is the second masking area information described in the embodiment of FIG. 2.
  • Step 305 The playing end determines whether the privacy mask of the original image needs to be masked according to whether the privacy masking permission information is stored.
  • the privacy masking permission information is used to indicate that the original image does not need to be shielded from privacy.
  • the playback end since the playback end can only recognize the original image, the second masked area information is obtained, and accordingly, only the second masked area in the original image can be privacy-masked. Therefore, in the embodiment of the present application, only one type of privacy de-encryption authority is set.
  • determining whether the privacy masking of the original image is required according to whether the privacy masking permission information is stored includes: determining whether the privacy masking permission information is stored; and when storing the privacy masking permission information, determining that the pairing is not required
  • the original image is subjected to privacy masking; when the privacy masking permission information is not stored, it is determined that privacy masking of the original image is required.
  • determining whether to store the privacy masking permission information further comprises: receiving authentication information, the authentication information is used for authenticating the display authority of the original image; determining whether the authentication information conforms to the privacy masking authority, The privacy de-encryption permission is used to indicate that the privacy of the original image is not occluded, and the privacy de-encryption permission is a permission carried in the original image or a default permission set; when the authentication information conforms to the privacy When the privilege is occluded, the privacy confiscation permission information is generated and stored.
  • Step 306 When privacy masking of the original image is required, the playing end performs privacy masking on the original image based on the privacy masking area information, obtains a masking image, and displays the masking image.
  • the privacy masking of the original image is performed based on the privacy masking area information, that is, the second masking area in the original image is privacy-masked based on the second masking area information.
  • Step 307 When the original image is not required to be masked by privacy, the player displays the original image.
  • the occlusion image can be displayed when privacy masking is required, and the original image can be displayed when privacy masking is not required, thereby realizing flexible display of the occlusion image and the original image as needed, thereby ensuring user privacy while ensuring Increased flexibility by extracting critical information from the original image when needed.
  • the acquisition module 11 in the image acquisition end 10 can collect the image in the surveillance scene, and send the image as the original image to be masked to the encoding module 12; the encoding module 12 takes the original
  • the image is encoded to obtain a compressed code stream, and the compressed code stream is sent to the encryption module 13; the encryption module 13 encrypts the compressed code stream to obtain a cryptographic stream, and sends the encrypted stream to the multimedia encapsulation module 14; the multimedia encapsulation module 14
  • the encrypted stream can be encapsulated to obtain a multimedia stream, and the multimedia stream can be sent to the playback terminal 20 through the output interface 15.
  • the masking module 16 of the image capturing end 10 shown in FIG. 1B can also obtain the first masking area information of the configuration, and perform privacy masking on the image collected by the collecting module 11 according to the first masking area information to obtain an original masking image.
  • the original masked image is sent to the encoding module 12 as an original image.
  • the input interface 21 in the playback terminal 20 can receive the multimedia stream sent by the image collection terminal 10 and send the multimedia stream to the multimedia decapsulation module 22; the multimedia decapsulation module 22 can decapsulate the multimedia stream.
  • the encrypted stream is obtained, and the encrypted stream is sent to the decrypting module 23; the decrypting module 23 can decrypt the encrypted stream by using the coded key of the encrypted stream to obtain a compressed stream, and send the compressed stream.
  • the decoding module 24 can decode the compressed code stream to obtain an original image, and send the original image to the recognition module 25 and the image synthesis module 27; the recognition module 25 can identify the original image to obtain the first The second area information is masked, and the second mask area information is sent to the image synthesis module 27;
  • the authentication module 26 can also receive the authentication information sent by the external device, and authenticate the authentication information, when the privacy is met.
  • the privilege is privileged
  • the privacy confusing permission information is sent to the image synthesizing module 27; after that, the image synthesizing module 27 can determine that the original image does not need to be privately shielded based on the received privacy occlusion permission information, and the display module 28 Sending the original image, the display module 28 can display the original image; if the image merging module 27 does not receive the privacy occlusion permission information, it can determine that the original image needs to be occluded, and based on the second
  • the masking area information masks the second masking area in the original image to obtain a masking image, and the masking image is sent to the display module 28.
  • the display module 28 can display the masking image.
  • the embodiment of the present application is only an example of an image acquisition and playback system composed of the image capturing end 10 and the playing end 20, and in actual applications, different image collecting ends are used. 10 and the playing end 20 can also be configured into other forms of image capturing and playing systems. The specific implementation process can be changed according to different systems, which is not limited in the embodiment of the present application.
  • the original image to be masked provided by the image collecting end may be acquired, and the original image may be identified to obtain privacy masking area information, and then determined according to whether or not the privacy masking permission information is stored. Whether the original image needs to be masked by privacy, when the original image needs to be masked by privacy, the original image is masked based on the privacy mask area information to obtain a mask image.
  • the image collecting end only needs to provide an original image, and the external end can determine whether the original image provided by the image collecting end needs to be shielded by the playing end, thereby realizing protection of user privacy, since the image collecting end does not need to provide a copy.
  • the original image and a shadow image are two images, so the cost of storage or transmission is low, which saves the storage resources and network resources of the image collection end.
  • FIG. 4 is a block diagram of an apparatus for displaying an image based on privacy masking according to an embodiment of the present application.
  • the apparatus includes:
  • the obtaining module 401 is configured to acquire an original image to be masked provided by the image collecting end, and obtain privacy masking area information of the original image, where the privacy masking area information is obtained from the original image or from the image collecting end Obtaining, the privacy masking area information is used to indicate an area in the original image that needs to be shielded;
  • the first determining module 402 is configured to determine, according to whether the privacy masking permission information is stored, whether the original image needs to be masked by privacy, and the privacy masking permission information is used to indicate that the original image does not need to be masked by privacy. And the privacy de-encryption permission information is generated according to the received authentication information, where the authentication information is used to authenticate the display permission of the original image;
  • the first display module 403 is configured to perform privacy masking on the original image based on the privacy masking area information, obtain a masked image, and display the masked image when privacy masking of the original image is required.
  • the device further includes:
  • a second display module configured to display the original image when privacy masking of the original image is not required.
  • the original image is an image taken by the image collecting end, or the image is taken
  • the collection end is an original occlusion image obtained by performing privacy occlusion on the captured image according to the first occlusion area information, and the first occlusion area information is configured for the image acquisition end.
  • the first determining module 402 includes:
  • a first determining unit configured to determine whether the privacy de-encryption permission information is stored
  • a first determining unit configured to determine, when the privacy de-encryption permission information is stored, that privacy masking of the original image is not required
  • a second determining unit configured to determine that the original image needs to be privacy-masked when the privacy de-encryption permission information is not stored.
  • the device further includes:
  • a first receiving module configured to receive the authentication information
  • a second judging module configured to determine whether the authentication information conforms to a privacy de-encryption authority, where the privacy de-obscuring permission is used to indicate that the user does not perform privacy obscuration on the original image, and the privacy de-encryption permission is The permission carried in the original image or the default permission set;
  • a first generating module configured to generate and store the privacy de-encryption permission information when the authentication information conforms to the privacy de-encryption permission.
  • the privacy masking area information includes first masking area information and/or second masking area information, where the first masking area information is configured for the image collecting end, and the second masking area information is paired The original image is obtained;
  • the first determining module 402 can include at least one of the following units:
  • a third determining unit configured to determine, when the first occlusion permission information is stored, that privacy occlusion is not required for the first occlusion region in the original image, where the first occlusion permission information is used to indicate that The first occlusion area performs privacy occlusion, and the first occlusion area is an area indicated by the first occlusion area information;
  • a fourth determining unit configured to: when the second occlusion permission information is stored, determine that the second occlusion area in the original image does not need to be occluded, the second occlusion permission information is used to indicate that the The second shielding area performs privacy shielding, and the second shielding area is the second shielding area The area indicated by the area information;
  • the first de-masking permission information and the second de-masking permission information are privacy de-encryption permission information.
  • the device further includes:
  • a second receiving module configured to receive the authentication information
  • a second generating module configured to generate and store the first de-masking permission information when the authentication information meets the first de-masking authority, where the first de-masking authority is used to indicate that the original image is in the original image
  • the first obscured area does not have privacy privacy
  • a third generating module configured to generate and store the second de-masking permission information when the authentication information meets the second de-masking authority, where the second de-masking authority is used to indicate that the original image is in the original image
  • the second occlusion area does not have privacy privacy
  • the first de-masking authority and the second de-masking authority are the rights carried in the original image or the set default permissions.
  • the obtaining module 401 includes:
  • a first acquiring unit configured to acquire a first multimedia stream generated by the image collecting end, where the first multimedia stream is obtained by encapsulating the original image by the image collecting end;
  • a first decapsulating unit configured to decapsulate the first multimedia stream to obtain a first encrypted stream
  • a first decrypting unit configured to decrypt the first encrypted stream by using a code stream key of the first encrypted stream to obtain a first compressed code stream
  • a first decoding unit configured to decode the first compressed code stream to obtain the original image
  • an identifying unit configured to identify the original image to obtain the privacy masking area information.
  • the obtaining module 401 includes:
  • a second acquiring unit configured to acquire a second multimedia stream generated by the image collecting end, where the second multimedia stream is a privacy masking area of the original image and the original image by the image collecting end Information is encapsulated;
  • a second decapsulation unit configured to decapsulate the second multimedia stream, to obtain a second encryption stream and the privacy mask area information
  • a second decrypting unit configured to decrypt the second encrypted stream by using a code stream key of the second encrypted stream to obtain a second compressed code stream
  • a second decoding unit configured to decode the second compressed code stream to obtain the original image.
  • the original image to be masked provided by the image collecting end is obtained, and the privacy masking area information of the original image is obtained, and the privacy masking area information may be obtained by identifying the original image or obtained from the image collecting end.
  • the privacy masking area information masks the privacy of the original image to obtain a masked image.
  • the image collecting end only needs to provide an original image, and the playing end can determine whether the original image provided by the image collecting end needs to be shielded by the external authentication, thereby realizing the protection of the user privacy, since the image collecting end does not need to provide one more.
  • the original image and a shadow image are two images, so the cost of storage or transmission is low, thereby saving storage resources and network resources of the image collection end.
  • FIG. 5 is a block diagram of an apparatus for displaying an image based on privacy masking according to an embodiment of the present application.
  • the apparatus includes:
  • a first acquiring module 501 configured to acquire an original image to be masked
  • a second obtaining module 502 configured to acquire privacy masking area information of the original image, where the privacy masking area information is used to indicate an area in the original image that needs to be shielded;
  • the providing module 503 is configured to provide the original image and the privacy masking area information to the playing end, and the playing end determines whether to perform privacy masking on the original image based on the privacy masking area information.
  • the first obtaining module 501 may include at least one of the following units:
  • a first determining unit configured to acquire an image captured on the monitoring scene, and determine the captured image as the original image
  • a second determining unit configured to acquire an image captured on the monitoring scene; and obtain a first mask of the configuration The area information; performing privacy masking on the captured image according to the first masking area information to obtain an original masking image; and determining the original masking image as the original image.
  • the providing module 503 includes:
  • a coding unit configured to encode the original image to obtain a compressed code stream
  • An encryption unit configured to encrypt the compressed code stream to obtain a password-added stream
  • An encapsulating unit configured to encapsulate the encrypted password stream and the privacy masking area information to obtain a multimedia stream
  • a providing unit configured to provide the multimedia stream to the playing end.
  • the second obtaining module 502 may include at least one of the following units:
  • a third determining unit configured to determine the configured first occlusion area information as privacy occlusion area information of the original image
  • a fourth determining unit configured to identify the original image, obtain second masking area information, and determine the second masking area information as privacy masking area information of the original image.
  • the device further includes:
  • a first setting module configured to: when the privacy masking area information of the original image is the first masking area information and/or the second masking area information, set a permission for privacy shielding of the original image Include permissions for privacy; or,
  • a second setting module configured to: when the privacy masking area information of the original image is the first masking area information and/or the second masking area information, not to the first masking area in the original image
  • the permission to perform privacy masking is set as the first de-masking authority and/or the permission to not mask the second masking area in the original image is set as the second de-masking authority
  • the first obscured area is the An area indicated by the first occlusion area information, where the second occlusion area is an area indicated by the second occlusion area information.
  • the original image to be identified may be obtained, and the privacy masking area information of the original image is obtained, where the privacy masking area information is used to indicate an area that needs to be shaded in the original image, and the original image and the privacy masking area are used.
  • Information is provided to the player, which is based on the privacy The area information is masked to determine whether privacy masking is performed on the original image.
  • the image collecting end only needs to provide an original image, and the playing end can determine whether the original image provided by the image collecting end needs to be shielded by the external authentication, thereby realizing the protection of the user privacy, since the image collecting end does not need to provide one more.
  • the original image and a shadow image are two images, so the cost of storage or transmission is low, thereby saving storage resources and network resources of the image collection end.
  • the apparatus for displaying an image based on the privacy mask provided by the foregoing embodiments of FIG. 4 and FIG. 5 is only exemplified by the division of the foregoing functional modules when displaying an image.
  • the foregoing function may be allocated according to requirements. It is completed by different functional modules, that is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above.
  • the apparatus for displaying an image based on the privacy mask provided by the foregoing embodiments of FIG. 4 and FIG. 5 is the same as the method embodiment of the method for displaying the image based on the privacy mask. The specific implementation process is described in detail in the method embodiment, and details are not described herein again.
  • FIG. 6 is a schematic structural diagram of a play end 600 according to an embodiment of the present disclosure.
  • the play end 600 mainly includes a transmitter 601, a receiver 602, and one or more processor cores 603, including one or more.
  • the receiver 602 can be configured to receive data sent by the image collecting end, such as an image, a privacy masking information, a video stream, and the like.
  • the memory 604 can be used to store data sent by the image acquisition end, and the memory 604 can also be used to store one or more running programs and/or modules for performing the above-described method based on privacy masking display images.
  • the processor 603 can be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more for controlling An integrated circuit executed by the program of the present application.
  • the processor 603 can implement the method provided by the embodiment of FIG. 2 or FIG. 3 above by running or executing a software program and/or module stored in the memory 604, and calling data stored in the memory 604.
  • the memory 604 may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, a random access memory (RAM) or Other types of dynamic storage devices that store information and instructions may also be Electrically Erasable Programmable Read-Only Memory (hereinafter referred to as EEPROM) or Read-Only Disc (Compact Disc Read-Only Memory). CD-ROM) or other optical disc storage, optical disc storage (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), disk storage media or other magnetic storage devices, or capable of carrying or storing instructions or data
  • EEPROM Electrically Erasable Programmable Read-Only Memory
  • CD-ROM or other optical disc storage
  • optical disc storage including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.
  • disk storage media or other magnetic storage devices or capable of carrying or storing instructions or data
  • the desired program code in the form of a structure and any other medium that
  • the communication bus 605 can include a path for communicating information between the processor 603 and the memory 604.
  • FIG. 7 is a schematic structural diagram of an image collecting end 700 according to an embodiment of the present disclosure.
  • the image collecting end 700 mainly includes a transmitter 701, a receiver 702, a memory 703, a processor 704, and a communication bus 705. It will be understood by those skilled in the art that the structure of the image acquisition end 700 shown in FIG. 7 does not constitute a limitation on the image collection end, and may include more or less components than those illustrated, or combine some components, or different. The component arrangement is not limited in this embodiment of the present application.
  • the transmitter 701 can be used to send data to the playing end, such as an image, a privacy masking information, or a video stream.
  • the memory 703 can be used to store captured images, and the memory 703 can also be used to store one or more running programs and/or modules for performing the above-described method of displaying images based on privacy masking.
  • the processor 704 can be a general purpose CPU, a microprocessor, an ASIC, or one or more integrated circuits for controlling the execution of the program of the present application.
  • the processor 704 can implement the methods provided by the embodiment of FIG. 2 or FIG. 3 above by running or executing software programs and/or modules stored in the memory 703, as well as invoking data stored in the memory 703.
  • the communication bus 705 can include a path in the processor 704 and the memory 703. Transfer information between.
  • the embodiment of the present application further provides a playing end, where the playing end includes: a casing, a processor, a memory, a circuit board, and a power circuit, wherein the circuit board is disposed inside the space enclosed by the casing, and the processor and the memory are disposed at a circuit board; a power circuit for powering various circuits or devices on the playback side; a memory for storing executable program code; and a processor executing the following program by executing executable program code stored in the memory:
  • the privacy masking area information is obtained by acquiring the original image or obtained from the image collecting end, and the privacy masking area information is used to indicate the need in the original image.
  • the privacy de-encryption permission information is used to indicate that privacy shielding is not required for the original image, and the privacy de-encryption permission information is based on the received authentication information.
  • the authentication information is used to authenticate the display permission of the original image;
  • the original image is privacy-masked based on the privacy masking area information, and the masked image is obtained, and the masked image is displayed.
  • the original image to be masked provided by the image collecting end is obtained, and the privacy masking area information of the original image is obtained, and the privacy masking area information may be obtained by identifying the original image or obtained from the image collecting end.
  • the privacy masking area information masks the privacy of the original image to obtain a masked image.
  • the image collecting end only needs to provide an original image, and the playing end can determine whether the original image provided by the image collecting end needs to be shielded by the external authentication, thereby realizing the protection of the user privacy, since the image collecting end does not need to provide one more.
  • the original image and a shadow image are two images, so the cost of storage or transmission is low, thereby saving storage resources and network resources of the image collection end.
  • the embodiment of the present application further provides an image collecting end.
  • the image collecting end includes: a casing, a processor, a memory, a circuit board, and a power circuit, wherein the circuit board is disposed inside the space enclosed by the casing, the processor and the memory.
  • Set on the circuit board power circuit for powering each circuit or device on the image acquisition end; memory for storing executable program code; processor running in memory Store the executable code to perform the following steps:
  • the original image and the privacy masking area information are provided to the playing end, and the playing end determines whether to mask the original image based on the privacy masking area information.
  • the original image to be identified may be obtained, and the privacy masking area information of the original image is obtained, where the privacy masking area information is used to indicate an area that needs to be shaded in the original image, and the original image and the privacy masking area are used.
  • the information is provided to the playing end, and the playing end determines whether to mask the original image based on the privacy masking area information.
  • the image collecting end only needs to provide an original image, and the playing end can determine whether the original image provided by the image collecting end needs to be shielded by the external authentication, thereby realizing the protection of the user privacy, since the image collecting end does not need to provide one more.
  • the original image and a shadow image are two images, so the cost of storage or transmission is low, thereby saving storage resources and network resources of the image collection end.
  • the privacy masking area information is obtained by acquiring the original image or obtained from the image collecting end, and the privacy masking area information is used to indicate the need in the original image.
  • the privacy de-encryption permission information is used to indicate that privacy shielding is not required for the original image, and the privacy de-encryption permission information is based on the received authentication information.
  • the authentication information is used to authenticate the display permission of the original image;
  • the original image is privacy-masked based on the privacy masking area information, and the masked image is obtained, and the masked image is displayed.
  • the original image to be masked provided by the image collecting end is obtained, and the privacy masking area information of the original image is obtained, and the privacy masking area information may be obtained by identifying the original image or obtained from the image collecting end. Obtained to indicate that the original image needs to be covered The masked area is then determined according to whether or not the privacy information is stored to determine whether the original image needs to be masked by privacy. When the original image needs to be masked by privacy, the original image is privacy based on the privacy masked area information. Obscured to get a shadow image.
  • the image collecting end only needs to provide an original image, and the playing end can determine whether the original image provided by the image collecting end needs to be shielded by the external authentication, thereby realizing the protection of the user privacy, since the image collecting end does not need to provide one more.
  • the original image and a shadow image are two images, so the cost of storage or transmission is low, thereby saving storage resources and network resources of the image collection end.
  • the original image and the privacy masking area information are provided to the playing end, and the playing end determines whether to mask the original image based on the privacy masking area information.
  • the original image to be identified may be obtained, and the privacy masking area information of the original image is obtained, where the privacy masking area information is used to indicate an area that needs to be shaded in the original image, and the original image and the privacy masking area are used.
  • the information is provided to the playing end, and the playing end determines whether to mask the original image based on the privacy masking area information.
  • the image collecting end only needs to provide an original image, and the playing end can determine whether the original image provided by the image collecting end needs to be shielded by the external authentication, thereby realizing the protection of the user privacy, since the image collecting end does not need to provide one more.
  • the original image and a shadow image are two images, so the cost of storage or transmission is low, thereby saving storage resources and network resources of the image collection end.
  • the embodiment of the present application further provides a storage medium for storing executable program code, and the executable program code is executed to perform the following steps:
  • the privacy masking area information is obtained by acquiring the original image or obtained from the image collecting end, and the privacy masking area information is used to indicate the need in the original image.
  • the masking, privacy de-encryption permission information is used to indicate that the original image is not required to be privately masked, and the privacy de-encryption permission information is generated according to the received authentication information, and the authentication information is used to authenticate the display permission of the original image;
  • the original image is privacy-masked based on the privacy masking area information, and the masked image is obtained, and the masked image is displayed.
  • the original image to be masked provided by the image collecting end is obtained, and the privacy masking area information of the original image is obtained, and the privacy masking area information may be obtained by identifying the original image or obtained from the image collecting end.
  • the privacy masking area information masks the privacy of the original image to obtain a masked image.
  • the image collecting end only needs to provide an original image, and the playing end can determine whether the original image provided by the image collecting end needs to be shielded by the external authentication, thereby realizing the protection of the user privacy, since the image collecting end does not need to provide one more.
  • the original image and a shadow image are two images, so the cost of storage or transmission is low, thereby saving storage resources and network resources of the image collection end.
  • the embodiment of the present application further provides a storage medium for storing executable program code, and the executable program code is executed to perform the following steps:
  • the original image and the privacy masking area information are provided to the playing end, and the playing end determines whether to mask the original image based on the privacy masking area information.
  • the original image to be identified may be obtained, and the privacy masking area information of the original image is obtained, where the privacy masking area information is used to indicate an area that needs to be shaded in the original image, and the original image and the privacy masking area are used.
  • the information is provided to the playing end, and the playing end determines whether to mask the original image based on the privacy masking area information.
  • the image collecting end only needs to provide an original image, and the playing end can determine whether the original image provided by the image collecting end needs to be shielded by the external authentication, thereby realizing the protection of the user privacy, since the image collecting end does not need to provide one more.
  • Two images of the original image and one masked image, so whether it is stored or transmitted The cost is low, which saves storage resources and network resources on the image acquisition side.
  • a person skilled in the art may understand that all or part of the steps of implementing the above embodiments may be completed by hardware, or may be instructed by a program to execute related hardware, and the program may be stored in a computer readable storage medium.
  • the storage medium mentioned may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Studio Devices (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

La présente invention concerne un procédé et un appareil d'affichage d'image utilisant un masquage de confidentialité, appartenant au domaine de la surveillance vidéo. Le procédé consiste à : acquérir une image d'origine à masquer fournie par une extrémité de collecte d'image et acquérir des informations de région de masquage de confidentialité de l'image d'origine, les informations de région de masquage de confidentialité étant obtenues par la réalisation d'une reconnaissance sur l'image d'origine ou étant acquises à partir de l'extrémité de collecte d'image, et indiquant une région qui doit être masquée dans l'image d'origine ; déterminer, en fonction des informations d'autorisation de démasquage de confidentialité comme étant stockées ou non, si un masquage de confidentialité doit être effectué sur l'image d'origine ; et lorsque le masquage de confidentialité doit être effectué sur l'image d'origine, réaliser un masquage de confidentialité sur les informations d'origine sur la base des informations de région de masquage de confidentialité pour obtenir une image masquée, et afficher l'image masquée. De cette manière, l'extrémité de collecte d'image a seulement besoin de fournir une image d'origine sans avoir à fournir à la fois l'image d'origine et une image masquée, ce qui réduit les coûts de stockage et de transmission, ainsi que les ressources de stockage requises et les ressources de réseau au niveau de l'extrémité de collecte d'image.
PCT/CN2017/091843 2016-12-16 2017-07-05 Procédé et appareil d'affichage d'image utilisant un masquage de confidentialité WO2018107729A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US16/469,909 US11163897B2 (en) 2016-12-16 2017-07-05 Method and apparatus for image display using privacy masking
EP17880938.0A EP3557864A4 (fr) 2016-12-16 2017-07-05 Procédé et appareil d'affichage d'image utilisant un masquage de confidentialité

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201611168947.9 2016-12-16
CN201611168947.9A CN108206930A (zh) 2016-12-16 2016-12-16 基于隐私遮蔽显示图像的方法及装置

Publications (1)

Publication Number Publication Date
WO2018107729A1 true WO2018107729A1 (fr) 2018-06-21

Family

ID=62558026

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/091843 WO2018107729A1 (fr) 2016-12-16 2017-07-05 Procédé et appareil d'affichage d'image utilisant un masquage de confidentialité

Country Status (4)

Country Link
US (1) US11163897B2 (fr)
EP (1) EP3557864A4 (fr)
CN (1) CN108206930A (fr)
WO (1) WO2018107729A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109660870A (zh) * 2018-12-04 2019-04-19 北京奇艺世纪科技有限公司 一种视频遮罩方法、装置及设备
CN111709859A (zh) * 2019-11-23 2020-09-25 陈波 基于内容数据解析的证据保全平台
EP3843381A4 (fr) * 2018-08-20 2022-05-18 Kabushiki Kaisha Toshiba Système de surveillance, procédé de surveillance et programme
WO2023065578A1 (fr) * 2021-10-20 2023-04-27 中兴通讯股份有限公司 Procédé de configuration d'informations, procédé de résolution de nom de domaine, dispositif électronique et support de stockage

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566743B (zh) * 2017-10-30 2019-10-11 珠海市一微半导体有限公司 移动机器人的视频监控方法
US11050978B2 (en) * 2017-11-29 2021-06-29 Kyocera Document Solutions, Inc. Monitoring system and image processing apparatus
EP3564900B1 (fr) * 2018-05-03 2020-04-01 Axis AB Procédé, dispositif et système pour un degré de flou devant être appliqué à des données d'image dans une zone de confidentialité d'une image
US11122237B2 (en) * 2018-06-05 2021-09-14 Axon Enterprise, Inc. Systems and methods for redaction of screens
CN109063505A (zh) * 2018-06-29 2018-12-21 努比亚技术有限公司 一种隐私保护方法、终端及计算机可读存储介质
CN111614930B (zh) * 2019-02-22 2022-11-25 浙江宇视科技有限公司 一种视频监控方法、系统、设备及计算机可读存储介质
US20220246085A1 (en) * 2019-06-27 2022-08-04 Sony Interactive Entertainment Inc. Image processing system, image processing integrated circuit, and image processing method
CN110881033B (zh) * 2019-11-07 2022-06-21 腾讯科技(深圳)有限公司 一种数据加密方法、装置、设备以及可读存储介质
CN111083424B (zh) * 2019-11-25 2023-04-07 视联动力信息技术股份有限公司 音视频加密传输方法、装置、电子设备及存储介质
CN111432286B (zh) * 2019-12-31 2022-05-20 杭州海康威视数字技术股份有限公司 视频处理的方法、装置和系统
CN111586361B (zh) * 2020-05-19 2021-10-15 浙江大华技术股份有限公司 一种图像的处理方法及相关装置
EP3923587B1 (fr) 2020-06-09 2022-03-30 Axis AB Procédé et dispositif pour démasquer partiellement un objet dans un flux vidéo
CN111711794A (zh) * 2020-06-22 2020-09-25 上海辰珅科技有限公司 防偷拍图像处理方法、装置、终端及存储介质
CN111866573B (zh) * 2020-07-29 2022-03-11 腾讯科技(深圳)有限公司 视频的播放方法、装置、电子设备及存储介质
CN112057874A (zh) * 2020-09-10 2020-12-11 重庆五诶科技有限公司 具备隐私保护的游戏辅助系统及方法
CN112365416A (zh) * 2020-11-10 2021-02-12 浙江大华技术股份有限公司 图片遮挡的处理方法和装置、存储介质及电子装置
CN112468823A (zh) * 2020-11-10 2021-03-09 浙江大华技术股份有限公司 一种基于模拟录像装置的隐私遮挡方法、装置和存储介质
EP4044138A1 (fr) 2021-02-16 2022-08-17 Axis AB Procédé et dispositif de capture d'image permettant d'installer le dispositif de capture d'image sur un réseau
CN112887799B (zh) * 2021-03-11 2023-07-25 北京小米移动软件有限公司 影像资源分享方法、装置及介质
CN113452688B (zh) * 2021-06-24 2022-07-08 山东三未信安信息科技有限公司 一种基于sm4与sm2算法的图像加密与解密方法及装置
CN113453012B (zh) * 2021-06-25 2023-02-28 杭州海康威视数字技术股份有限公司 一种编解码方法、装置及电子设备
CN114257837B (zh) * 2021-11-25 2023-12-01 杭州萤石软件有限公司 一种视频中隐私内容的处理方法、系统、电子设备及介质
KR102469380B1 (ko) * 2022-02-23 2022-11-23 (주)와토시스 영상 데이터의 개인정보 비식별화 및 복원 방법 및 장치
US20230316661A1 (en) * 2022-03-29 2023-10-05 Ambit Microsystems (Shanghai) Ltd. Method for preventing the viewing of data regarded as confidential in a shared augmented reality environment and system of protection
CN114419720B (zh) * 2022-03-30 2022-10-18 浙江大华技术股份有限公司 一种图像遮挡方法、系统及计算机可读存储介质
CN115426507B (zh) * 2022-07-29 2023-12-05 宁波星巡智能科技有限公司 基于目标检测的隐私视频传输、播放方法、装置及设备
TWI844064B (zh) * 2022-08-02 2024-06-01 晶睿通訊股份有限公司 影像資訊轉換方法、影像資訊輸出方法及其影像分析裝置
JP7374376B1 (ja) * 2022-09-26 2023-11-06 三菱電機株式会社 管理装置、管理システム、管理方法、および、設定方法

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005286468A (ja) * 2004-03-29 2005-10-13 Mitsubishi Electric Corp マスキング機能付き監視システムおよびカメラ、並びに該カメラとともに用いられるマスク解除装置
CN101389005A (zh) * 2007-09-11 2009-03-18 华为技术有限公司 一种对图像特定位置进行遮挡的方法及装置
US20120293654A1 (en) * 2011-05-17 2012-11-22 Canon Kabushiki Kaisha Image transmission apparatus, image transmission method thereof, and storage medium
CN103167216A (zh) * 2011-12-08 2013-06-19 中国电信股份有限公司 图像遮蔽处理方法及系统
WO2014056171A1 (fr) * 2012-10-11 2014-04-17 华为技术有限公司 Procédé, appareil et système de mise en œuvre d'une occlusion de vidéo
EP2874396A1 (fr) * 2013-11-15 2015-05-20 Everseen Ltd. Procédé et système pour sécuriser un flux de données
CN105208340A (zh) * 2015-09-24 2015-12-30 浙江宇视科技有限公司 一种视频数据的显示方法和装置

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6937730B1 (en) 2000-02-16 2005-08-30 Intel Corporation Method and system for providing content-specific conditional access to digital content
US8576282B2 (en) * 2008-12-12 2013-11-05 Honeywell International Inc. Security system with operator-side privacy zones
KR101271461B1 (ko) * 2009-10-09 2013-06-05 한국전자통신연구원 감시영상의 프라이버시 정보 보호 장치 및 방법
KR101320350B1 (ko) 2009-12-14 2013-10-23 한국전자통신연구원 보안관제서버 및 보안관제서버의 영상데이터 관리 방법
JP4843722B2 (ja) * 2010-05-21 2011-12-21 株式会社東芝 テレビジョン装置および電子機器
JP6112479B2 (ja) * 2012-11-29 2017-04-12 パナソニックIpマネジメント株式会社 監視カメラ装置、それを含む監視システム、マスク処理方法、及びマスク処理プログラム
US9280180B2 (en) * 2013-04-23 2016-03-08 Dell Products L.P. Information handling system display panel having offset supporting electronic components
CN205670807U (zh) * 2013-07-05 2016-11-02 菲力尔系统公司 监视系统
JPWO2015012360A1 (ja) * 2013-07-26 2017-03-02 三菱電機株式会社 監視カメラ、映像セキュリティシステム及び旋回型監視カメラ
PL2884748T3 (pl) * 2013-12-11 2017-05-31 Squadeo S.A.S. Aparat i sposób dekodowania skompresowanego wideo

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005286468A (ja) * 2004-03-29 2005-10-13 Mitsubishi Electric Corp マスキング機能付き監視システムおよびカメラ、並びに該カメラとともに用いられるマスク解除装置
CN101389005A (zh) * 2007-09-11 2009-03-18 华为技术有限公司 一种对图像特定位置进行遮挡的方法及装置
US20120293654A1 (en) * 2011-05-17 2012-11-22 Canon Kabushiki Kaisha Image transmission apparatus, image transmission method thereof, and storage medium
CN103167216A (zh) * 2011-12-08 2013-06-19 中国电信股份有限公司 图像遮蔽处理方法及系统
WO2014056171A1 (fr) * 2012-10-11 2014-04-17 华为技术有限公司 Procédé, appareil et système de mise en œuvre d'une occlusion de vidéo
EP2874396A1 (fr) * 2013-11-15 2015-05-20 Everseen Ltd. Procédé et système pour sécuriser un flux de données
CN105208340A (zh) * 2015-09-24 2015-12-30 浙江宇视科技有限公司 一种视频数据的显示方法和装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3557864A4

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3843381A4 (fr) * 2018-08-20 2022-05-18 Kabushiki Kaisha Toshiba Système de surveillance, procédé de surveillance et programme
CN109660870A (zh) * 2018-12-04 2019-04-19 北京奇艺世纪科技有限公司 一种视频遮罩方法、装置及设备
CN109660870B (zh) * 2018-12-04 2020-12-25 北京奇艺世纪科技有限公司 一种视频遮罩方法、装置及设备
CN111709859A (zh) * 2019-11-23 2020-09-25 陈波 基于内容数据解析的证据保全平台
WO2023065578A1 (fr) * 2021-10-20 2023-04-27 中兴通讯股份有限公司 Procédé de configuration d'informations, procédé de résolution de nom de domaine, dispositif électronique et support de stockage

Also Published As

Publication number Publication date
EP3557864A1 (fr) 2019-10-23
US20190318106A1 (en) 2019-10-17
US11163897B2 (en) 2021-11-02
CN108206930A (zh) 2018-06-26
EP3557864A4 (fr) 2019-11-13

Similar Documents

Publication Publication Date Title
WO2018107729A1 (fr) Procédé et appareil d'affichage d'image utilisant un masquage de confidentialité
KR101650002B1 (ko) 보안 증강 현실 애플리케이션을 위한 컨텍스트 기반 관리
KR101172093B1 (ko) 디지털 오디오/비디오 데이터 처리 장치 및 액세스 제어방법
KR102090696B1 (ko) 영상수신장치, 영상수신장치의 영상 복원 방법, 및 영상 시스템의 영상 마스킹 및 복원 방법
US20150188938A1 (en) Scene identification system and methods
AU2003203718A1 (en) Methods and systems for authentication of components in a graphics system
US11706382B2 (en) Methods and apparatus for encrypting camera media
US20100070991A1 (en) conditional access system
KR101837188B1 (ko) 비디오 보호 시스템
WO2023125291A1 (fr) Procédés, appareils et système d'écran et dispositif
CN103004219A (zh) 用于防止传送的视频数据的篡改的系统和方法
US20100259644A1 (en) Apparatus and method for processing image information
CN113453012A (zh) 一种编解码方法、装置及电子设备
CN111327947A (zh) 一种截屏管理方法、装置及移动终端
Wang et al. {CamShield}: Securing Smart Cameras through Physical Replication and Isolation
CN111200762B (zh) 一种基于视频实时在线共享浏览的水印及追溯系统和方法
KR20140051483A (ko) 오브젝트 특성에 따라 적응적으로 화면 정보 데이터를 보호하는 방법 및 장치
CN112954458A (zh) 视频遮挡方法、装置、电子装置和存储介质
CN116800965A (zh) 一种图像处理方法、编码装置、解码装置及存储介质
WO2015008252A1 (fr) Système de réception et de décryptage de contenu multimédia
CN116208833A (zh) 摄像头的隐私保护方法、装置及存储介质
CN115701017A (zh) 一种图像处理方法及装置
CN114902216A (zh) 数字版权管理drm的方法、装置和系统
KR101450649B1 (ko) 소프트웨어 보정필터를 이용한 멀티미디어 컨텐츠 drm 시스템
CN115695858B (zh) 基于sei加密的虚拟制片视频母片编解码控制方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17880938

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2017880938

Country of ref document: EP

Effective date: 20190716